Paper 2022/034
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic
Abstract
We present an information-theoretic transformation from any 2-round OT protocol with only game-based security in the presence of malicious adversaries into a 4-round (which is known to be optimal) OT protocol with simulation-based security in the presence of malicious adversaries. Our transform is the first satisfying all of the following properties at the same time: – It is in the plain model, without requiring any setup assumption. – It only makes black-box usage of the underlying OT protocol. – It is information-theoretic, as it does not require any further cryptographic assumption (besides the existence of the underlying OT protocol). Additionally, our transform yields a cubic improvement in communication complexity over the best previously known transformation.
Metadata
- Available format(s)
- Category
- Foundations
- Publication info
- Published elsewhere. Conference on Information-Theoretic Cryptography (ITC 2022)
- Keywords
- oblivious transfer malicious security plain model round-optimal black-box
- Contact author(s)
-
vrmadath @ ncsu edu
crorsini @ ncsu edu
ascafur @ ncsu edu
venturi @ di uniroma1 it - History
- 2022-07-19: last of 2 revisions
- 2022-01-14: received
- See all versions
- Short URL
- https://ia.cr/2022/034
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/034, author = {Varun Madathil and Chris Orsini and Alessandra Scafuro and Daniele Venturi}, title = {From Privacy-Only to Simulatable {OT}: Black-Box, Round-Optimal, Information-theoretic}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/034}, year = {2022}, url = {https://eprint.iacr.org/2022/034} }